General
-
Target
8021596186.zip
-
Size
3.0MB
-
Sample
220926-xg1r5schcn
-
MD5
1c029207939ae2ec1e17756cd41931d1
-
SHA1
bd09f38f4f922f1ba7c69f561f310bd3775fd076
-
SHA256
5c21370a49041a16320ee454120c256e07a54315af81c9a6e6e7f9c3be7fe0bf
-
SHA512
716b883963f1d39e93defbe205aa38698fe5500f91851576d1da79f4d2ee05d3c5aeb2bb365c17a5dc1e4e58384c9509c2ef9ed031378d830da8b89cb7f27181
-
SSDEEP
98304:GtMKESMEc4lOKJPuMCeEtJOPffoXllHdc:MM/zEDQKhRCPDXXrdc
Static task
static1
Behavioral task
behavioral1
Sample
38ac6284a88ccb4ee40212a22c2575bb90f719c6dad952c23a286759f1108c80.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38ac6284a88ccb4ee40212a22c2575bb90f719c6dad952c23a286759f1108c80.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
bitrat
1.38
ckjruifbnswdcy.con-ip.com:1880
-
communication_password
202cb962ac59075b964b07152d234b70
-
install_dir
AppData
-
install_file
Discord.exe
-
tor_process
tor
Targets
-
-
Target
38ac6284a88ccb4ee40212a22c2575bb90f719c6dad952c23a286759f1108c80
-
Size
3.4MB
-
MD5
aa460dc0cf6a357b45f66e9f7ef535c1
-
SHA1
fa4130f40cff7890b1773beec8fdc9132b76c69d
-
SHA256
38ac6284a88ccb4ee40212a22c2575bb90f719c6dad952c23a286759f1108c80
-
SHA512
bd403d094fb9f2b72cc254e9db2d2c841d0e46fe19334bba139d53c4087001d3d0e5ab716b86076710f592abe9f18ae4413a10eaa46c828242ccf16107bf0073
-
SSDEEP
98304:nmN2t+apaCv1Y6nyTsigAJ2FT8zd/oV2V:mN2gANrny7jJHh/q2V
Score10/10-
Detects BitRAT RAT
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-